Active Security Solutions Reports

CW Europe - December 2022 - February 2023: Finland prepares for drone technology take-off
sponsored by TechTarget ComputerWeekly.com
EZINE: Finland is preparing for a future where it could rely on flying drone technology. Read about its plans in this issue. Also find out how a PhD student in the Netherlands is helping to detect hidden messages on the internet by using steganography.
Posted: 23 Nov 2022 | Published: 08 Dec 2022

TechTarget ComputerWeekly.com

Computer Weekly - 22 June 2021: A new three-year plan for digital government
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.
Posted: 21 Jun 2021 | Published: 22 Jun 2021

TechTarget ComputerWeekly.com

CW Nordics - August-October 2022: Norway struggles to keep up with demand for tech specialists
sponsored by TechTarget ComputerWeekly.com
EZINE: The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies.
Posted: 04 Aug 2022 | Published: 25 Aug 2022

TechTarget ComputerWeekly.com

U.S. FTC Safeguards Rule
sponsored by Cisco
WHITE PAPER: The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  Security
Cisco

Log More to Improve Visibility and Enhance Security
sponsored by CrowdStrike
WHITE PAPER: ph
Posted: 22 Sep 2023 | Published: 22 Sep 2023

TOPICS:  Security
CrowdStrike

Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 June 2022: Managing Apple Macs in the enterprise
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with more people working remotely, the use of Apple Macs in the enterprise is growing – we look at how to manage them securely. Our latest buyer's guide examines security in the supply chain. And 10 years on from the London Olympics, we find out how data innovation is revitalising its legacy. Read the issue now.
Posted: 13 Jun 2022 | Published: 14 Jun 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to anti-ransomware
sponsored by TechTarget ComputerWeekly.com
EBOOK: The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
Posted: 12 Dec 2022 | Published: 12 Dec 2022

TechTarget ComputerWeekly.com

MicroScope – April 2023: The benefits of security accreditations
sponsored by MicroScope
EZINE: In this month's MicroScope ezine, we look at how industry-recognised certifications can strengthen business defences. We also see how ChatGPT offers the channel a chance to level the playing field. Read the issue now.
Posted: 31 Mar 2023 | Published: 07 Apr 2023

MicroScope

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com